We propose to combine a triangular element surface model with a linearized reflectance map to formulate the shape-from-shading problem. The main idea is to approximate a smooth sur...
Kyoung Mu Lee (Seoul National University), C.-C. J...
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
—In mobile ad hoc networks, solving the standard problems encountered in fixed networks can be challenging because of the unpredictable motion of mobile nodes. Due to the lack o...
Reliability-aware power management (RAPM) schemes, which consider the negative effects of voltage scaling on system reliability, were recently studied to save energy while preserv...
Abstract—We propose an Optical Line Terminal (OLT) centric Dynamic Bandwidth Allocation (DBA) scheme based on individual requests from service queues in Optical Network Units (ON...